Incze Lajos wrote:

> On Wed, Jan 31, 2001 at 01:55:46PM -0800, Joerg Beekmann wrote:
> >
> >
> > > Is it really a security risk, though?  Remember that the
> > > password displayed here
> > > did *not* work (otherwise, the user would have been logged
> > > in), so a potential
> > > attacker is not learning anything new.  After all, they can
> > > just try various
> > > username and password combinations on your login screen, and
> > > find out exactly the
> > > same thing, even if the password text were not echoed.
> > >
> > I don't understand, seems to me the attacker is learning something.
> > Two likely reasons for a failed login are:
> > - simple typo; in this case trying a few variations or in many cases
> > correcting the spelling will get the attacker in.
> > - the user has multiple passwords and typed the wrong one. This
> > might compromise other systems
> >
> > Joerg
>
> I fully understand to Joerg. Refrain the password (which can be seen
> in hte HTML source view) is a bug.
>
> 1. As any sysadmin can tell you, users - if they can - will select
>    meaningful passwords. I sight enough somtimes to know what the typo
>    was, and what the real passowrd is.
>
> 2. Another issue is privacy. Users think what they type TOTALLY ENCRYPTED
>    and you can get very inconvenient situations when something thought
>    to be secret will be unveiled in clear text. So, it's simply HURTING
>    A CONTRACT (that's why I'm calling it bug, not risk).
>                                                                incze

These arguments make sense ... I just checked in a patch.

Note that doing this breaks a different contract ("all Struts form tags
redisplay the previous values from the corresponding form bean property"),
but in the case of conflicting goals security needs to win.

Craig


Reply via email to